Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The Value-Driven AI Roadmap

      September 9, 2025

      This week in AI updates: Mistral’s new Le Chat features, ChatGPT updates, and more (September 5, 2025)

      September 6, 2025

      Designing For TV: Principles, Patterns And Practical Guidance (Part 2)

      September 5, 2025

      Neo4j introduces new graph architecture that allows operational and analytics workloads to be run together

      September 5, 2025

      Lenovo Legion Go 2 specs unveiled: The handheld gaming device to watch this October

      September 10, 2025

      As Windows 10 support ends, users weigh costly extended security program against upgrading to Windows 11

      September 10, 2025

      Lenovo’s Legion Glasses 2 update could change handheld gaming

      September 10, 2025

      Is Lenovo’s refreshed LOQ tower enough to compete? New OLED monitors raise the stakes at IFA 2025

      September 10, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      External Forces Reshaping Financial Services in 2025 and Beyond

      September 10, 2025
      Recent

      External Forces Reshaping Financial Services in 2025 and Beyond

      September 10, 2025

      Why It’s Time to Move from SharePoint On-Premises to SharePoint Online

      September 10, 2025

      Apple’s Big Move: The Future of Mobile

      September 10, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Lenovo Legion Go 2 specs unveiled: The handheld gaming device to watch this October

      September 10, 2025
      Recent

      Lenovo Legion Go 2 specs unveiled: The handheld gaming device to watch this October

      September 10, 2025

      As Windows 10 support ends, users weigh costly extended security program against upgrading to Windows 11

      September 10, 2025

      Lenovo’s Legion Glasses 2 update could change handheld gaming

      September 10, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Salesloft Drift Security Breach Expands: Dozens of Companies Confirm Exposure in OAuth-Based Cyberattack

    Salesloft Drift Security Breach Expands: Dozens of Companies Confirm Exposure in OAuth-Based Cyberattack

    September 10, 2025

    Salesloft Drift cyberattack

    A Salesloft Drift cyberattack has compromised the Salesforce environments of numerous organizations, exposing customer data and credentials in a growing software supply chain incident. Triggered by a compromise of OAuth tokens used in the Drift chatbot’s integration with Salesforce, the Salesloft Drift security breach has impacted companies across cybersecurity, cloud infrastructure, DevOps, and SaaS industries. 

    The Salesloft Drift cyberattack, which occurred between August 8–18, 2025, enabled threat actors to extract sensitive information from Salesforce instances using stolen authorization tokens. Google’s Threat Intelligence team identified the attacker as GRUB1, a threat group that systematically exploited the Salesloft Drift integration to conduct credential harvesting and metadata reconnaissance. 

    Cloudflare: ‘Failure in Vendor Oversight’

    Cloudflare was among the most heavily impacted. Between August 12–17, the attacker accessed Cloudflare’s Salesforce case data using a compromised OAuth token issued to the Drift app. According to the company’s investigation, the attacker harvested metadata, ran queries against internal Salesforce objects, and eventually exfiltrated freeform customer support case text using Salesforce’s Bulk API 2.0. 

    Cloudflare’s internal tools later identified 104 exposed API tokens, all of which have since been rotated. The company acknowledged the breach as “a failure in third-party vendor oversight” and is now reevaluating its security policies around third-party integrations. Affected customers were contacted directly by September 2. 

    Dynatrace, Cato Networks, and Bugcrowd Affected

    Dynatrace reported that the Salesloft Drift breach affected only its Salesforce CRM system, which is used for marketing purposes. Investigators confirmed that only limited business contact data was accessed. The company immediately deactivated Drift and involved third-party forensic experts. It emphasized that neither Dynatrace products nor infrastructure were affected.

    Similarly, Cato Networks took immediate containment steps, revoking all Drift-related API access and launching an internal investigation. The data accessed was limited to case metadata and contact information. Cato’s threat intel unit, Cato CTRL, is monitoring the dark web for potential misuse, though no signs have surfaced yet.

    Bugcrowd confirmed unauthorized access to its Salesforce environment but found no impact on vulnerability reports, customer data, or infrastructure. The company is collaborating with Salesforce and Salesloft to assess the full scope. 

    BeyondTrust and Zscaler: Proactive Revocation, No System Impact

    BeyondTrust was alerted by Salesforce on August 22 and immediately revoked OAuth credentials and disabled Drift access. An internal investigation found no impact beyond Salesforce, and no customer data misuse has been detected.

    Zscaler also acknowledged limited exposure of Salesforce data, including contact and licensing information. The company found no indication of misuse but continues to monitor closely.

    PagerDuty and JFrog Respond

    PagerDuty received a formal alert from Salesloft on August 20 confirming a compromise in the Drift OAuth flow. Investigators identified a few Salesforce cases that contained API keys. These keys were revoked, and affected customers were directly notified. PagerDuty advised all customers to rotate any credentials previously shared via Salesforce support cases.

    JFrog reported potential unauthorized access on August 23. No misuse or broader compromise was found, but customers were advised to rotate any shared credentials as a precaution.

    Nutanix and Elastic: Minimal Exposure

    Nutanix confirmed that certain case metadata, like subject lines and descriptions, was accessed, but no file attachments or sensitive system data were involved. Elastic also reported limited access to business contact details stored in Salesforce, with no known misuse or impact on its operational environments.

    GRUB1’s Attack Chain: Precision and Persistence

    Cloudflare’s detailed forensics highlighted the attacker’s methodology: 

    • August 9: GRUB1 attempted to validate an API token via Salesforce. 
    • August 12–14: Unauthorized access began. The attacker enumerated Salesforce schemas and explored data structures.
    • August 17: Using new infrastructure, GRUB1 executed a data exfiltration job via Salesforce Bulk API 2.0.
    • August 20: Salesloft revoked all Drift OAuth credentials; Cloudflare had not yet received a formal alert.
    • August 23–25: Salesforce and Salesloft formally notified customers, triggering mass revocations and internal containment across affected organizations.

    Supply Chain Attack Landscape Intensifies

    The Salesloft Drift security breach exemplifies the growing threat of supply chain attacks. According to Cyble, the rate of supply chain attacks has doubled since April 2025, now averaging 26 incidents per month. These attacks exploit the trust placed in third-party integrations, often bypassing internal security controls. 

    Cyble reported that at least 20 industries were affected in 2025 alone, and one ransomware group recently claimed to have exfiltrated data on 41,000 customers from a separate supply chain incident. 

    Security Takeaways from the Salesloft Drift Breach

    The Salesloft Drift cyberattack stresses critical flaws in OAuth security and third-party risk management:

    • OAuth tokens must be rotated frequently and tightly scoped.
    • Third-party app access should be strictly limited and continuously audited.
    • Organizations should centralize visibility into integrated platforms and enforce least privilege access.
    • Rapid detection and revocation processes are vital to containing OAuth-related threats.

    Salesforce has since removed Drift from the AppExchange, and Google has disabled Drift’s OAuth integration with Workspace. Salesloft has urged customers to revoke old API keys and reauthenticate with new credentials.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleAxios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks
    Next Article Jaguar Land Rover Cyberattack Forces Extended Factory Shutdown and Disrupts Global Operations

    Related Posts

    Development

    How AI is Redefining Traditional GCC Cost Models for Peak Efficiency

    September 10, 2025
    Development

    How to Automate API Documentation Updates with GitHub Actions and OpenAPI Specifications

    September 10, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-46358 – Emerson ValveLink Inadequate Protection Mechanism Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-40625 – TCMAN GIM Unauthenticated File Upload RCE

    Common Vulnerabilities and Exposures (CVEs)

    Banquet hall advertising

    Web Development

    Automation Test Coverage Metrics for QA and Product Managers

    Development

    Highlights

    Telegraph – Morse translator

    August 6, 2025

    Telegraph is a simple Morse translator, start typing your message to see the resulting Morse…

    Data Structure and Algorithm Patterns for LeetCode Interviews

    July 22, 2025

    How to Build a Custom Visual Testing Tool with Selenium: A Practical Guide

    June 25, 2025

    CVE-2025-37786 – Linux Kernel DSA Net Use-After-Free Vulnerability

    May 1, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.